Analysis Overview
SHA256
8238ff6f1493c9c489bc0aba12e0cf6ac057875045c28a2a4b110a128f64c282
Threat Level: Known bad
The file unpacked_2fa83a1f4b3196a87645d4e71c3a486c7eb433ccb462c85888d5a5dee2abe2e2.zip was found to be: Known bad.
Malicious Activity Summary
Darkgate family
Detect DarkGate stealer
System Location Discovery: System Language Discovery
Unsigned PE
Program crash
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-10 17:24
Signatures
Darkgate family
Detect DarkGate stealer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-10 17:24
Reported
2024-11-10 17:27
Platform
win10v2004-20241007-en
Max time kernel
94s
Max time network
149s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe
"C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3160 -ip 3160
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 468
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
memory/3160-0-0x0000000000463000-0x000000000046A000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-10 17:24
Reported
2024-11-10 17:27
Platform
win7-20241010-en
Max time kernel
14s
Max time network
18s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe
"C:\Users\Admin\AppData\Local\Temp\44a0000.f8849031-05af-4cdc-98d3-848251cef52b.exe"